[RC5] My contribution to RC5
ganesh.sittampalam at magd.ox.ac.uk
Mon Apr 6 00:44:15 EDT 1998
> > If I wanted to send something secret, then as the final stage before encrypting
> > it, I would compress it into some format with no header information whatsoever.
> > How would you handle cracking that efficiently?
> I would find out what compression alogrithim you used, then attempt to
> decompress after decrypting it. Note, BTW, that most compression formats
> include a CRC, so that would make the attacker's job easyer, not harder.
> Note also that PGP does this.
That's why I said no header information - I would also leave out CRC data.
Someone has suggested arithmetic compression to me - something which
produces *no* recognisable streams of bits.
My point is that this makes the job of checking decrpyted data much much
harder so the cost of key cracking is increased by a large factor.
To unsubscribe, send 'unsubscribe rc5' to majordomo at lists.distributed.net
rc5-digest subscribers replace rc5 with rc5-digest
More information about the rc5